BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance

作者: Seonghyeon Gong , Changhoon Lee

DOI: 10.3390/ELECTRONICS9030521

关键词: Smart contractComputer securityDisseminationSystem modelSecurity policyReliability (computer networking)TraceabilitySybil attackBlockchainComputer science

摘要: The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has dramatically increased diversity complexity network. This change diversifies attacker’s attack vectors, increasing impact damage cyber threats. Cyber threat intelligence (CTI) technology is a proof-based security system which responds to these advanced threats proactively by analyzing sharing security-related data. However, performance CTI systems can be significantly compromised creating disseminating improper policies if an attacker intentionally injects malicious data into system. In this paper, we propose blockchain-based framework that improves confidence in source content quickly detect eliminate inaccurate for resistance Sybil attack. proposed collects procedure validated through smart contracts stores information about metainformation blockchain ensures validity reliability ensuring traceability proposes model efficiently operate manage compliance with de facto standard. We present simulation results prove effectiveness Sybil-resistance terms cost attackers.

参考文章(39)
Sagar Samtani, Kory Chinn, Cathy Larson, Hsinchun Chen, AZSecure Hacker Assets Portal: Cyber threat intelligence and malware analysis intelligence and security informatics. pp. 19- 24 ,(2016) , 10.1109/ISI.2016.7745437
Seokcheol Lee, Taeshik Shon, Open source intelligence base cyber threat inspection framework for critical infrastructures future technologies conference. pp. 1030- 1033 ,(2016) , 10.1109/FTC.2016.7821730
Sara Qamar, Zahid Anwar, Mohammad Ashiqur Rahman, Ehab Al-Shaer, Bei-Tseng Chu, Data-driven analytics for cyber-threat intelligence and information sharing Computers & Security. ,vol. 67, pp. 35- 58 ,(2017) , 10.1016/J.COSE.2017.02.005
Antoine Lemay, Joan Calvet, François Menet, José M. Fernandez, Survey of publicly available reports on advanced persistent threat actors Computers & Security. ,vol. 72, pp. 26- 59 ,(2018) , 10.1016/J.COSE.2017.08.005
Nir Kshetri, Blockchain's roles in strengthening cybersecurity and protecting privacy Telecommunications Policy. ,vol. 41, pp. 1027- 1038 ,(2017) , 10.1016/J.TELPOL.2017.09.003
Wiem Tounsi, Helmi Rais, A survey on technical threat intelligence in the age of sophisticated cyber attacks Computers & Security. ,vol. 72, pp. 212- 233 ,(2018) , 10.1016/J.COSE.2017.09.001
Ali Dehghantanha, Dennis Kiwia, Jim Slaughter, Kim-Kwang Raymond Choo, A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence Journal of Computational Science. ,vol. 27, pp. 394- 409 ,(2017) , 10.1016/J.JOCS.2017.10.020
Minhaj Ahmad Khan, Khaled Salah, IoT security: Review, blockchain solutions, and open challenges Future Generation Computer Systems. ,vol. 82, pp. 395- 411 ,(2017) , 10.1016/J.FUTURE.2017.11.022
Shancang Li, Li Da Xu, Shanshan Zhao, 5G Internet of Things: A survey Journal of Industrial Information Integration. ,vol. 10, pp. 1- 9 ,(2018) , 10.1016/J.JII.2018.01.005